The logs need to be reviewed from November 2020 up to present day. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. Clients can protect against this attack by restricting untrusted connections, or by setting up a VPN to separate the Exchange server from external access. Using this mitigation will only protect against the initial portion of the attack; other portions of the chain can be triggered if an attacker already has access or can convince an administrator to run a malicious file.
The GDS Team will continue to monitor this issue and the impact that it could have on our clients. If you have any questions regarding the information in this alert or general utility security questions, please contact our Team:
Bill Bateman Bill.Bateman@gdsassociates.com
Kevin Goolsby Kevin.Goolsby@gdsassociates.com
Dex Underwood Dex.Underwood@gdsassociates.com
James FenstermakerJames.Fenstermaker@gdsassociates.com